30 Best CEOs of the Year 2020 30 Best CEOs of the Year 2020 | Page 51
“
CyberX isn’t just a business” for us; it represents
a moral obligation to do what we do best. We’re
here because we want to be. And that makes all
the difference in the world.”
builds a network topology diagram,
using the Purdue Model, showing
how all devices are connected to each
other as well as any connections to IT
networks. Devices can be highlighted
on the map (or filtered) based on
tags including protocols used, polling
intervals, standard ports, and subnets.
Risk & Vulnerability
Management
As the most complete industrial
cybersecurity platform, the CyberX
platform is able to analyze any IoT
and ICS environment and return
an objective risk score. That’s why
CyberX’s Vulnerability Assessment
report has quickly become the
industry standard that boards of
directors, internal auditors, regulators,
and other overseers are looking for.
Threat Monitoring & Detection
CyberX uses 5 separate yet integrated
analytics engines to immediately
detect both zero-day and known
threats in real-time.
Behavioral Anomalies: CyberX uses
an innovative, patented technology
called Industrial Finite-State Modeling
(IFSM) to quickly spot baseline
deviations by modeling ICS networks
as deterministic sequences of states
and transitions.
Protocol Violations: indicating the
use of packet structures and field
values that violate ICS protocol
specifications as defined by IoT
and ICS vendors. These indicate
potential misuse of the IoT and ICS
protocol to exploit device or network
vulnerabilities.
Industrial Malware: Behaviors
indicating the presence of known
malware such as WannaCry and
NotPetya as well as purpose-built
IoT and ICS malware such as TRITON
and Industroyer.
Machine-To-Machine (M2m)
Communications: It is identified
via ICS-aware heuristics such as
PLCs should not typically be
communicating with other PLCs.
Operational Issues: It uses
intermittent connectivity indicating
early signs of equipment failure.
Soc Integration
CyberX reduces complexity and
eliminates IT/OT silos by integrating
out-of-the-box with your existing
SOC workflows and security stack.
Centralized Management
CyberX’s scalable architecture
enables centralized visibility and
control across multiple tiers in the
organization, giving you a single
unified view of IoT and ICS risk
across all their sites worldwide.
SR
The driving force
behind the robust
glory of CyberX
Omer Schneider is
the Co-founder and
also serves as the Chief
Executive Officer
of CyberX. Prior to co-
founding CyberX, Mr. Omer
Schneider led a blue team
cybersecurity unit tasked
with protecting critical
national infrastructure,
where he headed day-
to-day cybersecurity
operations and managed
the development and
acquisition of security
technologies across all
layers of the security stack.
He was also invited to be
a member of his country’s
national cybersecurity
initiative and is a
contributing member of
the Industrial Internet
Consortium (IIC). Omer
holds a BSc. in Computer
Engineering from the
Technion Institute and
an MBA degree from Tel
Aviv University Business
School.